All IoTSI Workbooks and instructional material. Free Download.
Login Required to view and/or download document.
IoT Operational Model. This model provides a clear view of the 10 layer stack of an IoT Solution. This view can be beneficail in obtaining a high level view of the IoT Solution's key design decisions. It is possible to utilise the IoT Asset Register document to obtain a detailed view of solution components and possible risk exposure.
Operation Workflows Sheet:
A workflow consists of an orchestrated and repeatable pattern of business activity enabled by the systematic organization of resources into processes that transform materials, provide services, or process information.It can be depicted as a sequence of operations, the work of a person or group, the work of an organization of staff, or one or more simple or complex mechanisms. (Wikipedia)
Top-Level Network Model
The IoTSI -SERA Framework incorporates two key design features that differentiate it from other security risk assessments. The first is the use of operational models. Participants applying traditional security-risk assessments typically rely on their tacit understanding of the operational context in which a software-reliant system must operate. Our experience indicates that tacit assumptions are often incorrect or incomplete, which adversely affects the results of a security risk analysis. We propose using operational models to describe a system’s operational context.
In software and systems engineering, a use case is a list of actions or event steps typically defining the interactions between a role (known in the Unified Modeling Language (UML) as an actor) and a system to achieve a goal. The actor can be a human or other external system. In systems engineering, use cases are used at a higher level than within software engineering, often representing missions or stakeholder goals.
Risk Assessment Workbook
Residual Risk Worksheet
IoT Device Checklist. Critical to the deploment of an IoT system is the assessment of IoT devices. These devices require strigent assessment to ensure they meet baseline security requirements.
Login Required to view and/or download document. Non login users will only see the Details tab
IoTSI Asset Register contains all IoT Solutions Assets. It is possible to utilise this document with the IoT OP model to better undestand solution components and risk exposure.
Please complete the form below to download the document [DOCUMENT_TITLE]